(no title)
nexus_six | 1 year ago
The threat model would be highly dependent on the carrier used. For example, if you're using LoRa an adversary would be using far different methods of disruption when compared to a traditional overlay network.
nexus_six | 1 year ago
The threat model would be highly dependent on the carrier used. For example, if you're using LoRa an adversary would be using far different methods of disruption when compared to a traditional overlay network.
kragen|1 year ago
i think physical-layer disruption like lora jamming is kind of a separate consideration, but physical-layer traffic analysis might not be
i had misunderstood you to be saying that the second reticulum node ever was at your house, so i had assumed you were the author